Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Advanced Network Engineering Assignment

Question 1 - (Based on Netmonlab1a_16and Netmonlab1b_16exercises)

(a) (i) Explain with reference to a Wireshark packet trace, what happens when you Ping a PC on the same subnet with a packet size of 2500Bytes and what the purpose of the ping -f and ping -i switch?

(ii) The Fluke Micro-Scanner cable tester gave an out of spec result of 110m for the length of the cable between a bench-socket 28 and the hub room. If the incorrect NVP setting was 74% and the actual cable length is 96m, calculate the correct NVP value needed to calibrate the instrument.

(iii) With reference to your results from part c explain what device was most likely the performance bottleneck for Internet download speed.

(iv) Submit a screen shot of the CPU test_xl log file showing the %Processor Time and processor Queue Length counter as an Excel graph as described in lab1a Partc(ii) 7.

Explain how Performance Console was used to display a message on screen when processor activity exceeded a threshold value of 80%. Include screenshots of the message and application log for this event.

(b) (i) Submit the completed Table 1 from part b 4 and comment the effect of TCP receive window size (RWIN) on throughput performance for each PHY. Estimate the min RWIN size for Gigabit Ethernet to get maximum throughput for RTT = 0.1ms.

(ii) Report on the streaming video performance investigation over the 10BaseT Ethernet network you undertook in Part 2 (b) of lab1b. Include any relevant results to support your conclusions.

(iii) Include a Wireshark decode to confirm that TCP checksum offloading was being done in part c (i) 6 and explain why it increased throughput performance in the benchmark tests.

(iv) Discuss the theoretical reasons for employing Jumbo frames in the big file download scenarios and account for any unexpected results you obtained in practice.

Submit Wireshark results to show that Jumbo frames were actually being used and explain why ping -l 2500 -f doesn't cause frame fragmentation when Jumbo frames are transmitted.

Question 2 - (Based on netmonlab2_16exercise)

(a) (i) State the information you obtained and OID for the Agent PC when you issued the Get command from the MIB browser for the SysDescr object.

(ii) Submit your Wireshark SNMP packet decodes of the following:

- Response packet carrying the SysDescr information highlight community name, SNMP version and UDP port number.

- First trap generated when the SNMP agent PC service was restarted, highlighting the trap type and UDP port number.

(b) (i) State the CLI commands used to configure the 2960 switch for operation in the public community with read only access and trap destination 192.168.1.101.

(ii) List the other management options for configuring SNMP on the Cisco 2960 switch.

(ii) Explain how you would configure the Cisco2960 switch so that activity on port 1 can be monitored by a monitor PC connected to port 8.

(c) (i) Submit the NetworkView map you obtained in Part4a showing the devices discovered on you subnet.

(ii) Show the SNMP info discovered by NetworkView about the Cisco router and list the non SNMP discovery methods it uses to obtain information about network devices.

(iii) State the purpose of the Cisco CDP and Microsoft LLTDP protocols. Submit Wireshark decodes showing the content of a CDP and LLTDP frame and a screenshot of the network maps.

(iv) Write a script which can execute as a batch file on a Windows computer to discover the IP address, MAC address and NetBIOS names of all the devices on a subnet and save the results to a .txt file located on the desktop.

Assume that you know the subnet number; that all the devices have correct addresses/subnet masks and respond to ICMP requests.

Submit test results showing at least two discovered devices.

Question 3 - (Based on NetmonLab3_16 exercise)

(a) (i) Submit the table of results from part A showing the wireless networks detected with the InSSider site survey tools. Define the RSSI and S/N metrics used in the table.

(ii) Calculate the power level in nW received by your network adapter and the noise level in dBm for a RSSI of -60dBm and S/N of 30dB.

(iii) Review the WiSPY spectrum analyser recording made during the lab session (see BB Support Resources Folder) and then identify the first time the video sender was used to jam the nwlan-5 access point. Submit a screen shot showing this period.

Suggest how video sender interference could be minimised for 802.11b/g mode and why 802.11a or 802.11ac mode might be a better choice in this case.

(b) (i) Submit your TCP throughput results from section D Table 2 along with an Excel histogram chart to help you compare the performance of the different scenarios.

Confirm or otherwise the expectations that IEEE 802.11n provides 6x the throughput and performs better than legacy IEEE 802.11a/b/g networks in mixed mode operation.

(ii) Explain why your data throughput results are much less than the raw transmission speeds for each wireless mode and account for the higher throughput between a wireless station and wired server compared to wireless to wireless station.

(iii) Describe how multiple spatial streams, 40GHz channels and short guard interval used by IEEE 802.11n equipment increases wireless transmission speed.

Locate the MCS index for the 3x3 to 2x3 MIMO system used in the lab and state the modulation technique and best link speed(data rate) it can employ. Use the values in the table to show how the link speed is determined for this particular index.

(c) (i) With reference to the Wireshark VoIP call Statistics flowgraphderived from the packet capture, explain the 3 phases of a SIP phone call.

(iv) Submit one of the decoded RTP packets from your VoIP tests highlighting the ITU G.711 codec payload and RTP, UDP and IP headers. Determine the voice payload size and show that it corresponds to the default G.711 20ms sample size in bytes. Calculate the bandwidth requirement for a G.711VoIP call over a LAN for a frame overhead of 18 bytes.

(v) Present the graphical results of the VoIP QoS tests made with the Expert Analysisfeature of Observer and indicate the R-Factor and MOS score obtained. Confirm or otherwise the expectation that IEEE802.11 supports reliable VoIP even when sharing the network with heavy data loads.

Question 4 - (Based on netmonlab4_16 exercise)

(a) (i) Calculate the theoretical minimum time to transfer a 100MB file over a TI WAN link using FTP and explain why it may take much longer in practice and why upgrading to a T3 service may not improve throughput very much for a long distance link.

(ii) Submit a comparison graph showing the results you obtained for the RiverbedIT GURU WAN TCP window size optimisation simulation lab for the file transfer over a T1and T3 link for default 8KB window size and when the window size is increased to 65KB.

(iii) Compare the simulation and emulation methods for testing this scenario and list the pros and cons of each.

(b) The SG TCP Optimizer utility below allowed you to view and tune TCP settings for your client PC.

1210_Figure.png

(i) Distinguish between the normal and disabled TCP auto tuning levels and explain why for MSS=1460 Bytes the RWIN value of 64240Bytesmay give better throughput performance than RWIN=65535 Bytes.

(ii) Show screenshots of the SG TCP/IP Analyzer results for normal and disabled TCP auto tuning levels for the Downlink Global Speed test and submit Wireshark decoded TCP SYN packets for each case with the following details highlighted:

  • TCP window size
  • MSS
  • Scale factor
  • Sack status

(iii) State the max RWIN value achieved for the normal level download speed test and a screenshot of a TCP ACK packet advertising this value.   

(c) (i) Submit in one table the results for the real and emulated BT broadband speed tests.

(ii) Discuss your findings for the broadband emulation and account for any major differences between the real and emulated results.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92291287

Have any Question?


Related Questions in Computer Network & Security

Toms income is 480and he spends it on two goods x and y his

Tom's income is $480and he spends it on two goods, X and Y. His utility function is U = XY. Both X and Y sells for $8 per unit.   a. Use lagrangian function to calculate Tom's utility-maximizing purchases of X and Y.  b. ...

Objectivespart 1 researching network attacks- research

Objectives Part 1: Researching Network Attacks - Research network attacks that have occurred. - Select a network attack and develop a report for presentation to the class. Part 2: Researching Network Security Audit Tools ...

Question do some research and find a case of cyber

Question : Do some research and find a case of cyber harassment or cyberbullying. Explain the case, and discuss the relevant theories of criminal justice associated with the perpetrator(s). Your response should be a mini ...

A wall street journal article noted that a study by us

A Wall Street Journal article noted that a study by U.S. Congressional Budget Office "estimated raising the minimum wage to $10.10 per hour reduced U.S employment by 500,000 but lift 900,000 Americans out of poverty". Wh ...

Part ian attacker seeks to view the contents of a specific

Part I An attacker seeks to view the contents of a specific Microsoft Word document file to which they do not have any kind of access. You may assume that: - no exploitable vulnerabilities of any kind exist; - the attack ...

If a router is attached to a network with a base ip address

If a router is attached to a network with a base IP address of 198.10.0.0/20 and receives a packet addressed to 198.10.10.144, answer the following questions: a. What is the network mask used by the router? (in dotted de ...

Overviewthis assignment has three major aims- to help

Overview This assignment has three major aims: - To help students gain good understanding of theoretical and practical material. - To encourage students to use content analysis summaries to prepare for tests, examination ...

Wireless sensor networks wsn let users to access servers

Wireless Sensor Networks (WSN) let users to access servers, printers, and other network resources regardless of their location, within the wireless reach. This flexibility means that, for example, a user's laptop stays c ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Task1 in each of the following scenarios there is a

Task 1. In each of the following scenarios there is a relationship to work life in the IT industry. With each of the following question, ensure that your answer includes the explanation of how it would be applied to work ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As